• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 18
  • 17
  • 8
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 87
  • 87
  • 29
  • 28
  • 14
  • 14
  • 13
  • 13
  • 11
  • 11
  • 11
  • 11
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Hades - an asynchronous superscalar processor

Elston, Corrie John January 1996 (has links)
No description available.
2

The perception and experiences of employees about the nature of communication in the North Rand region of the Department of Social Development.

Matema, Tsholofelo Glodia 29 June 2012 (has links)
Organisational excellence stems from the dedicated commitment of peoplewho are motivated to work together and share similar values and visions about their results of their efforts. Organisational communication is linked to managerial effectiveness, the integration of work units across organisational levels and job communication satisfaction. The Department of Social Development can review their levels of communication and the interpersonal relationship in a bid to address their quality of productivity, satisfaction of employees, communication flow, and protocol and to bring changes in the life of the organisation. The success of an organisation is based on the communication levels, flow of information and how people interact. Communication systems within organisations, both human and technological, are responsible for creatively solving increasingly complex problems. The researcher has observed that lack of communication hampers service delivery and production in the Department of Social Development. The study focuses on the perceptions and experiences of employees about the nature of communication at the Department of Social Development in the North RandRegion. A qualitative research approach that was exploratory in nature was followed. The main aim of the study was to determine how the existing communication protocol and communication channels are utilised in the Department of Social Development. Asemi-structured interview schedule and questionnaire were used as research instruments. The methods of data collection were face-toface interviews with 10 participants and questionnaires consisting onlyof open-ended questions that were completed by eight individual respondents. The population for the study was employees of the Department of Social Development in the North Rand Region. The sample represented employees from top management, middle management, line management and junior staff who have been in the employment of the Department of Social Development for more than six months. The study revealed that there is a lack of understanding of relationship roles and that employees communicate without understanding and sometimes they do not seek clarity. All parties involved must be proactive, clear messages should be communicated to all employees, employees have first to seek understanding, allow questions and provide clarity and attempt to understand the relationship role between manager andsubordinate. However, misunderstanding and misinterpretation were identified as major contributing factors to effective communication.
3

Research and Development of General Purpose Controller for Underwater Vehicle

Chang, Wen-li 21 July 2010 (has links)
During the underwater vehicle R&D process, a crucial task in the beginning phase is to decide the specifications of sensors and actuators. The designers need to make decisions if an off-the-shelf product will meet the requirement, or more efforts should be devoted to the development of a component. The communication format undertaken between the controller and the subsystems is another important design issue worth of close attention. Once these specifications are settled, it will be very troublesome to change them afterwards in case a design flaw is discovered. It will be even worse if the problems are found after the prototype vehicle is constructed. In order to ensure the flexibility and shorten the development time, this paper proposes an architecture for general-purpose low level controller suitable for underwater vehicles. We suggest using the idea of ¡§tiers¡¨ to construct a vehicle controller with multiple layers. Generally speaking, there are many different paths of information flow in a vehicle control system. It can be high-level tier and abstractive intention of the human operator interpreted by the man-machine interface; or the mid-level tier control commands to maneuver the vehicle to a specific direction; down to the low -level tier as the raw commands fed to the thrusters. The performance and the reliability of the system deeply depend on the flow of these information and commands. High- and mid-level tiers information can be modeled mathematically, but the low-level tier is product-dependent. In other words, once a new sensor or actuator is installed, the control software related to these components need to be revised accordingly. The modification of the software might exist at multiple places if the structure is not organized as tiers. In order to maintain full flexibility of the vehicle controller structure throughout the R&D period, the high- and mid-level will be implemented in the man-machine interface for ROV case, and in the mission planner in the AUV case. The low-level tier is implemented in the onboard computer. The onboard low-level controller covers a variety of communication format of physical ports, such as serial line, D/A, A/D, D/IO and PWM. Port setting parameters, such baud-rate or DA range, can be specified remotely on the surface. The physical connecting ports of the sensors can be changed freely without rewiring or reprogramming. Taking the stability of the controller as the top priority, we used DOS operating system as the platform to implement our concepts. DOS has been in the market for more than two decades, but it has the merits of fast in booting, highly stable, efficient in computation. We use its timer interrupt service INT 0X1C to construct a realtime thread to poll the readiness of sensory channels, and uploads the data to the surface via a channel-driven packet. The packets delivered to the surface are split into channels and reconstructed back to their original raw data format. The other necessary service routines, such as DA, AD and DIO, are also embedded inside this thread for its promptitude. We constructed an experimental platform with this low-level controller to verify if the vehicle alitude control can be accurate enough as the carrier of the Seafloor Laser Scanner developed by our lab. Prior to the experiments, issues, such as whether the bouyancy of the system is pro or con for driving the vechile, were studied with Simulink. The poorness of altitude control caused by the deadzone effect of the thruster failed to be duplicated as in the simulation, while the alitude control gave a tracking error within ¡Ó 5cm.
4

Designing a Prototype of Communication Protocol for FlexRAM Architecture

Liu, Hsien-Ming 26 July 2001 (has links)
In recent years, many researchers investigated a new class of computer architecture, called intelligent memory (IRAM), to reduce the performance gap between the CPU and memory. In order to increase the flexibility of designing parallel applications, we develop the communication mechanisms for FlexRAM, one of the IRAM architectures. The communication protocol is called CPFR (Communication Protocol for FlexRAM). For the reason of lacking whole communication mechanism in the original FlexRAM architecture, we construct CPFR by using the features of shared-memory and the notification primitive centrally controlled by the main memory processor (P.Mem). In addition, we provide a uniform programming interface in CPFR for the programmers. An example is also used to demonstrate the usage of our communication protocol in detail.
5

Bezdrátová komunikace v mobilní robotice / Wireless Communication in Mobile Robotics

Hricišin, Tomáš January 2010 (has links)
This work deals with the fundamental principles of wireless communications in mobile robotics. It introduces overview of the use of different frequency bands for wireless communications needs and control of mobile devices in Czech Republic. It also contains a brief overview of all applicable technologies and available modules that can be used for wireless communication. The theoretical part deals with some of the protocols that were used in the practical part of this work and the manner of wave propagation in buildings. The practical part consisted of a design of our own application to monitor and control the module Mikrotik Routerboard. With this application we have tested and compared two wireless cards of this module.
6

Syntax-based Security Testing for Text-based Communication Protocols

Kam, Ben W. Y. 30 April 2010 (has links)
We introduce a novel Syntax-based Security Testing (SST) framework that uses a protocol specification to effectively perform security testing on text-based communication protocols. A protocol specification of a particular text-based protocol under-tested (TPUT) represents its syntactic grammar and static semantic contracts on the grammar. Mutators written in TXL break the syntactic and semantic constraints of the protocol specification to generate test cases. Different protocol specification testing strategies can be joined together to yield a compositional testing approach. SST is independent of any particular text-based protocols. The power of SST stems from the way it obtains test cases from the protocol specifications. We also use the robust parsing technique with TXL to parse a TPUT. SST has successfully revealed security faults in different text-based protocol applications such as web applications and kOganizer. We also demonstrate SST can mimic the venerable PROTOS Test-Suite: co-http-reply developed by University of Oulu. / Thesis (Ph.D, Computing) -- Queen's University, 2010-04-30 16:01:18.048
7

Diagnostika komunikačního protokolu ARION / Communication SW ARION

Kaczmarczyk, Václav January 2008 (has links)
The main goal of this thesis is creating diagnostic software for analyse communication via protocol ARION. That software would record and store communication data which can be analyzed late and also allows direct communication analysis in real time. Except that there will be visualization functions, for effective representation of data (stored or real-time recorded). This software can be used either by net developers or by end-users like easy visualization software. Next point is describing communication protocol ARION and create developer’s handbook. The practical part of this thesis consists of two points. The first one is developing simple device which allows communicating via protocol ARION. In second communication firmware for that device is written and tested.
8

Rozšíření komunikačního protokolu MPKT na platformě .NET / MPKT communication protocol extension on .NET platform

Görlich, Tomáš January 2009 (has links)
This thesis is focused on extension of MPKT 2008 communication protocol. It has been made analysis of this protocol version and proposals to improve and extend this version with other options have been raised. It has been created a new version of the protocol on the basis of the proposals. Then the .NET platform has been presented and its architecture has been described. The C# language available on the .NET platform has been chosen to implement the new protocol version and its facilities for network communication and threading have been described. It has been said an assessment of the application of this programming language in practical lessons. A proposal to update tutorial texts has been made.
9

Zabezpečovací modul pro reklamní robot FEKT VUT v Brně / Safety module for promotional robot of FEEC BUT

Španihel, Pavol January 2012 (has links)
The aim of this work is to design a safety module for promotional robot FEEC BUT robot, which is based on evaluation kit RDK-IDM-SBC. The security module allows authorized persons control different parts of the robot (monitors, computers and subsystems included in the robot).
10

Analyzing and Improving Security-Enhanced Communication Protocols

Weicheng Wang (17349748) 08 November 2023 (has links)
<p dir="ltr">Security and privacy are one of the top concerns when experts select for communication protocols. When a protocol is confirmed with problems, such as leaking users’ privacy, the protocol developers will upgrade it to an advanced version to cover those concerns in a short interval, or the protocol will be discarded or replaced by other secured ones. </p><p dir="ltr">There are always communication protocols failing to protect users’ privacy or exposing users’ accounts under attack. A malicious user or an attacker can utilize the vulnerabilities in the protocol to gain private information, or even take control of the users’ devices. Hence, it is important to expose those protocols and improve them to enhance the security properties. Some protocols protect users’ privacy but in a less efficient way. Due to the new cryptography technique or the modern hardware support, the protocols can be improved with less overhead and enhanced security protection. </p><p dir="ltr">In this dissertation, we focus on analyzing and improving security-enhanced communication protocols in three aspects: </p><p dir="ltr">(1) We systematically analyzed an existing and widely used communication protocol: Zigbee. We identified the vulnerabilities of the existing Zigbee protocols during the new device joining process and proposed a security-enhanced Zigbee protocol. The new protocol utilized public-key primitives with little extra overhead with capabilities to protect against the outsourced attackers. The new protocol is formally verified and implemented with a prototype. </p><p dir="ltr">(2) We explored one type of communication detection system: Keyword-based deep packet inspection. The system has several protocols, such as BlindBox, PrivDPI, PE-DPI, mbTLS, and so on. We analyzed those protocols and identified their vulnerabilities or inefficiencies. To address those issues, we proposed three enhanced protocols: MT-DPI, BH-DPI, and CE-DPI which work readily with AES-based encryption schemes deployed and well-supported by AES-NI. Specifically, MT-DPI utilized multiplicative triples to support multi-party computation. </p><p dir="ltr">(3) We developed a technique to support Distributed confidential computing with the use of a trusted execution environment. We found that the existing confidential computing cannot handle multiple-stakeholder scenarios well and did not give reasonable control over derived data after computation. We analyzed six real use cases and pointed out what is missing in the existing solutions. To bridge the gap, we developed a language SeDS policy that was built on top of the trusted execution environment. It works well for specific privacy needs during the collaboration and gives protection over the derived data. We examined the language in the use cases and showed the benefits of applying the new policies.</p>

Page generated in 0.1496 seconds